vulnerability

Oracle Linux: CVE-2018-25032: ELSA-2022-4584: zlib security update (IMPORTANT) (Multiple Advisories)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:C)
Published
Apr 20, 2018
Added
Apr 29, 2022
Modified
Jan 7, 2025

Description

zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
An out-of-bounds access flaw was found in zlib, which allows memory corruption when deflating (ex: when compressing) if the input has many distant matches. For some rare inputs with a large number of distant matches (crafted payloads), the buffer into which the compressed or deflated data is written can overwrite the distance symbol table which it overlays. This issue results in corrupted output due to invalid distances, which leads to out-of-bound access, corrupting the memory and potentially crashing the application.

Solution(s)

oracle-linux-upgrade-mingw32-zliboracle-linux-upgrade-mingw32-zlib-staticoracle-linux-upgrade-mingw64-zliboracle-linux-upgrade-mingw64-zlib-staticoracle-linux-upgrade-miniziporacle-linux-upgrade-minizip-develoracle-linux-upgrade-rsyncoracle-linux-upgrade-rsync-daemonoracle-linux-upgrade-zliboracle-linux-upgrade-zlib-develoracle-linux-upgrade-zlib-static
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.